Secure encrypted-data aggregation for wireless sensor networks

被引:0
|
作者
Shih-I Huang
Shiuhpyng Shieh
J. D. Tygar
机构
[1] National Chiao Tung Univerisity,Department of Computer Science and Information Engineering
[2] Industrial Technology Research Institute,undefined
[3] University of California Berkeley,undefined
来源
Wireless Networks | 2010年 / 16卷
关键词
Data aggregation; Wireless; Sensor networks; Secrecy; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. Conventional aggregation functions operate when readings are received in plaintext. If readings are encrypted, aggregation requires decryption creating extra overhead and key management issues. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet. Our scheme is resilient to known-plaintext attacks, chosen-plaintext attacks, ciphertext-only attacks and man-in-the-middle attacks. Our experiments show that our proposed aggregation method significantly reduces communication overhead and can be practically implemented in on-the-shelf sensor platforms.
引用
收藏
页码:915 / 927
页数:12
相关论文
共 50 条
  • [1] Secure encrypted-data aggregation for wireless sensor networks
    Huang, Shih-I
    Shieh, Shiuhpyng
    Tygar, J. D.
    [J]. WIRELESS NETWORKS, 2010, 16 (04) : 915 - 927
  • [2] SEA: Secure Encrypted-data Aggregation in mobile wireless sensor networks
    Huang, Shih-, I
    Shieh, Shiuhpyng
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 848 - +
  • [3] Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
    Castelluccia, Claude
    Chan, Aldar C-F
    Mykletun, Einar
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) : 1 - 36
  • [4] Secure comparison of encrypted data in wireless sensor networks
    Acharya, M
    Girao, J
    Westhoff, D
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, : 47 - 53
  • [5] Efficient aggregation of encrypted data in wireless sensor networks
    Castelluccia, C
    Mykletun, E
    Tsudik, G
    [J]. PROCEEDINGS OF MOBIQUITOUS 2005, 2005, : 109 - 117
  • [6] Encrypted data comparison and aggregation for wireless sensor networks
    Guo, Jianghong
    Ma, Jianfeng
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (11) : 42 - 53
  • [7] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [8] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [9] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [10] Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks
    Bahi, Jacques M.
    Guyeux, Christophe
    Makhoul, Abdallah
    [J]. 2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 472 - 477